نتایج جستجو برای: layered intrusion
تعداد نتایج: 51992 فیلتر نتایج به سال:
Owing to population growth and water demand, coastal aquifers all over the world are over–pumped, resulting in serious problems such as saltwater intrusion. So, in these conditions, assessing the groundwater system’s vulnerability and finding areas with saltwater intrusion potential are vital for the better management of aquifers. In this study, AHP-GALDIT was applied to saltwater intrusion vul...
An extensible firewall has been implemented that performs packet filtering, content scanning, and per-flow queuing of Internet packets at Gigabit/second rates. The firewall uses layered protocol wrappers to parse the content of Internet data. Packet payloads are scanned for keywords using parallel regular expression matching circuits. Packet headers are compared to rules specified in Ternary Co...
Several mafic-ultramafic layered intrusions were emplaced in the NE Fennoscandian Shield during a magmatic episode at 2.44 Ga. The Paleoproterozoic Näränkävaara intrusion, northern Finland, is one of largest ultramafic bodies Shield, with surface area 25 km x 5 and stratigraphic thickness ~3 km. intrusion comprises 1.3 km-thick peridotitic–dioritic series (2436 ± Ma) two peridotitic reversals, ...
We report on the progress of the VenusDB active-database system as driven by WatchDog, an application in network intrusion detection. The application is typical of a class of problems we coin monotonic log monitoring systems. These are systems where real-time data sources are logged to a database for transactional assurances and the database further provides services for decision support. Miles...
Many of the challenges that the society faces today are enterprise problems. Enterprise systems consist of technological, organizational, and social elements where there is no locus of control. Due to the complex nature of enterprise systems, they are particularly difficult to model and analyze in support of policy analysis. There is a need for accessible methods and approaches to aid those tas...
Security is an essential service for wired and wireless network communications. The success of mobile ad hoc networks (MANET) strongly depends on people’s confidence in its security. However, the characteristics of MANET pose both challenges and opportunities in achieving security goals, such as confidentiality, authentication, integrity, availability, access control, and non-repudiation. We pr...
In the Trinity ophiolite, California, USA, several mafic-ultramafic plutons intruded a peridotitic host 435 to 405 m.y. ago in tectonic setting interpreted as an arc-related spreading centre. One of these intrusions, Bear Creek area, exposes basal ultramafic cumulates with igneous layering comprising alternation uncommonly thin (down few mm) layers dunite, peridotite and pyroxenite that might b...
The effects of link annotations on user search performance in hypertext environments having deep (layered) and shallow link structures were investigated in this study. Four environments were tested—layered-annotated, layered-unannotated, shallow-annotated, and shallow-unannotated. A single document was divided into 48 sections, and layered and unlayered versions were created. Additional version...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید